Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
The power of trusted endpoints

The story of digital authentication started in an MIT lab in 1961, when a group of computer scientists got together and devised the concept of passwords. Little did they know …

cloud
Take back control of IT with cloud native IGA

For many organizations, working with the current identity access management (IAM) and identity governance and administration (IGA) solutions is like driving a 20-year-old car: …

HITB trainings
Cybersecurity training: Learn how to secure containerized environments

Driven by a strong curiosity to know how computers and computer programs are made, how they work, and how safe they are, Sheila A. Berta, Head of Security Research at Dreamlab …

IoT security
Global number of industrial IoT connections to reach 36.8 billion by 2025

The global number of industrial IoT connections will increase from 17.7 billion in 2020 to 36.8 billion in 2025, representing an overall growth rate of 107%, Juniper Research …

BitDam videos
Video series: Get into the phisher’s mind

Check out this series to understand the phisher’s perspective and better defend your organization from cyber threats. In this series of videos, BitDam’s cyber expert, Roy …

red
Ermetic’s platform provides full stack visibility and control over multi-cloud infrastructure entitlements

Ermetic announced a platform that provides full stack visibility and control over multi-cloud infrastructure entitlements. By analyzing identity and access management (IAM) …

Confluera partners with 3SG Plus to expand the Confluera 2020 Reseller Program

Confluera announced its partnership with 3SG Plus as part of the new Confluera 2020 Reseller Program. The expansion of the program continues Confluera’s momentum in the XDR …

Entersekt appoints Nicolas Huss to its board of directors

Entersekt announced the appointment of Nicolas Huss to its board of directors. In the twenty years he has been active in financial services and payments, Huss has built a …

Qualys
Qualys Container Runtime Security: Defense for containerized applications

Qualys announced Container Runtime Security, which provides runtime defense capabilities for containerized applications. Qualys Runtime Container Security This new approach …

Google Chrome
Google fixes two actively exploited Chrome zero-days (CVE-2020-16009, CVE-2020-16010)

For the third time in two weeks, Google has patched Chrome zero-day vulnerabilities that are being actively exploited in the wild: CVE-2020-16009 is present in the desktop …

Specops Password Policy
Review: Specops Password Policy

Specops Password Policy is a powerful tool for overcoming the limitations of the default password policies present in Microsoft Active Directory environments. To be fair, …

Phishing
How to deal with the escalating phishing threat

In today’s world, most external cyberattacks start with phishing. For attackers, it’s almost a no-brainer: phishing is cheap and humans are fallible, even after …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools